Amarnag Subramanya & Jeff Bilmes Department of Electrical Engineering, University of Washington, Seattle. {asubram,bilmes}@ee.washington.edu

Abstract We prove certain theoretical properties of a graph-regularized transductive learning objective that is based on minimizing a Kullback-Leibler divergence based loss. These include showing that the iterative alternating minimization procedure used to minimize the objective converges to the correct solution and deriving a test for convergence. We also propose a graph node ordering algorithm that is cache cognizant and leads to a linear speedup in parallel computations. This ensures that the algorithm scales to large data sets. By making use of empirical evaluation on the TIMIT and Switchboard I corpora, we show this approach is able to outperform other state-of-the-art SSL approaches. In one instance, we solve a problem on a 120 million node graph.

1

Introduction

The process of training classifiers with small amounts of labeled data and relatively large amounts of unlabeled data is known as semi-supervised learning (SSL). In many applications, such as speech recognition, annotating training data is time-consuming, tedious and error-prone. SSL lends itself as a useful technique in such situations as one only needs to annotate small amounts of data for training models. For a survey of SSL algorithms, see [1, 2]. In this paper we focus on graph-based SSL [1]. Here one assumes that the labeled and unlabeled samples are embedded within a low-dimensional manifold expressed by a graph — each data sample is represented by a vertex within a weighted graph with the weights providing a measure of similarity between vertices. Some graph-based SSL approaches perform random walks on the graph for inference [3, 4] while others optimize a loss function based on smoothness constraints derived from the graph [5, 6, 7, 8]. Graph-based SSL algorithms are inherently non-parametric, transductive and discriminative [2]. The results of the benchmark SSL evaluations in chapter 21 of [1] show that graph-based algorithms are in general better than other SSL algorithms. Most of the current graph-based SSL algorithms have a number of shortcomings – (a) in many cases, such as [6, 9], a two class problem is assumed; this necessitates the use of sub-optimal extensions like one vs. rest to solve multi-class problems, (b) most graph-based SSL algorithms (exceptions include [7, 8]) attempt to minimize squared error which is not optimal for classification problems [10], and (c) there is a lack of principled approaches to integrating class prior information into graph-based SSL algorithms. Approaches such as class mass normalization and label bidding are used as a postprocessing step rather than being tightly integrated with the inference. To address some of the above issues, we proposed a new graph-based SSL algorithm based on minimizing a Kullback-Leibler divergence (KLD) based loss in [11]. Some of the advantages of this approach include, straightforward extension to multi-class problems, ability to handle label uncertainty and integrate priors. We also showed that this objective can be minimized using alternating minimization (AM), and can outperform other state-of-the-art SSL algorithms for document classification. Another criticism of previous work in graph-based SSL (and SSL in general) is the lack of algorithms that scale to very large data sets. SSL is based on the premise that unlabeled data is easily 1

obtained, and adding large quantities of unlabeled data leads to improved performance. Thus practical scalability (e.g., parallelization), is very important in SSL algorithms. [12, 13] discuss the application of TSVMs to large-scale problems. [14] suggests an algorithm for improving the induction speed in the case of graph-based algorithms. [15] solves a graph transduction problem with 650,000 samples. To the best of our knowledge, the largest graph-based problem solved to date had about 900,000 samples (includes both labeled and unlabeled data) [16]. Clearly, this is a fraction of the amount of unlabeled data at our disposal. For example, on the Internet alone we create 1.6 billion blog posts, 60 billion emails, 2 million photos and 200,000 videos every day [17]. The goal of this paper is to provide theoretical analysis of our algorithm proposed in [11] and also show how it can be scaled to very large problems. We first prove that AM on our KLD based objective converges to the true optimum. We also provide a test for convergence and discuss some theoretical connections between the two SSL objectives proposed in [11]. In addition, we propose a graph node ordering algorithm that is cache cognizant and makes obtaining a linear speedup with a parallel implementation more likely. As a result, the algorithms are able to scale to very large datasets. The node ordering algorithm is quite general and can be applied to graph-based SSL algorithm such as [5, 11]. In one instance, we solve a SSL problem over a graph with 120 million vertices. We use the phone classification problem to demonstrate the scalability of the algorithm. We believe that speech recognition is an ideal application for SSL and in particular graph-based SSL for several reasons: (a) human speech is produced by a small number of articulators and thus amenable to representation in a low-dimensional manifold [18]; (b) annotating speech data is time-consuming and costly; and (c) the data sets tend to be very large.

2

Graph-based SSL

Let Dl = {(xi , ri )}li=1 be the set of labeled samples, Du = {xi }l+u i=l+1 , the set of unlabeled samples and D , {Dl , Du }. Here ri is an encoding of the labeled data and will be explained shortly. We are interested in solving the transductive learning problem, i.e., given D, the task is to predict the labels of the samples in Du . The first step in most graph-based SSL algorithms is the construction of an undirected weighted graph G = (V, E), where the vertices (nodes) V = {1, . . . , m}, m = l + u, are the data points in D and the edges E ⊆ V × V . Let Vl and Vu be the set of labeled and unlabeled vertices respectively. G may be represented via a symmetric matrix W which is referred to as the weight or affinity matrix. There are many ways of constructing the graph (see section 6.2 in [2]). In this paper, we use symmetric k-nearest neighbor (NN) graphs — that is, we first form wij , [W]ij = sim(xi , xj ) and then make this graph sparse by setting wij = 0 unless i is one of j’s k nearest neighbors or j is one of i’s k nearest neighbors. It is assumed that sim(x, y) = sim(y, x). Let N (i) be the set of neighbors of vertex i. Choosing the correct similarity measure and |N (i)| are crucial steps in the success of any graph-based SSL algorithm as it determines the graph [2]. For each i ∈ V and j ∈ Vl , define probability measures pi and rj respectively over the measurable space (Y, Y). Here Y is the σ-field of measurable subsets of Y and Y ⊂ N (the set of natural numbers) is the space of classifier outputs. Thus |Y| = 2 yields binary classification while |Y| > 2 implies multi-class. As we only consider classification problems here, pi and ri are multinomial distributions, pi (y) is the probability that xi belongs to class y and the classification result is given by argmaxy pi (y). {rj }, j ∈ Vl encodes the labels of the supervised portion of the training data. If the labels are known with certainty, then rj is a “one-hot” vector (with the single 1 at the appropriate position in the vector). rj is also capable of representing cases where the label is uncertain, i.e., for example when the labels are in the form of a distribution (possibly derived from normalizing scores representing confidence). It is important to distinguish between the classical multi-label problem and the use of uncertainty in rj . If it is the case that rj (¯ y1 ), rj (¯ y2 ) > 0, y¯1 6= y¯2 , it does not imply that the input xj possesses two output labels y¯1 and y¯2 . Rather, rj represents our belief in the various values of the output. As pi , ri are probability measures, they lie within a |Y|-dimensional probability simplex which we represent using M|Y| and so pi , ri ∈M|Y| (henceforth denoted as M). Also let p , (p1 , . . . , pm ) ∈Mm ,M × . . . × M (m times) and r , (r1 , . . . , rl ) ∈Ml . Consider the optimization problem proposed in [11] where p∗ = minm C1 (p) and p∈M

C1 (p) =

l X i=1

DKL ri ||pi + µ

m X

X

i=1 j∈N (i)

2

m X wij DKL pi ||pj − ν H(pi ). i=1

Here H(p) = −

P

p(y) log p(y) is the Shannon entropy of p and DKL (p||q) is the KLD between P measures p and q and is given by DKL (p||q) = y p(y) log p(y) q(y) . If µ, ν, wij ≥ 0, ∀ i, j then C1 (p) is convex [19]. (µ, ν) are hyper-parameters whose choice we discuss in Section 5. The first term in C1 penalizes the solution pi i ∈ {1, . . . , l}, when it is far away from the labeled training data Dl , but it does not insist that pi = ri , as allowing for deviations from ri can help especially with noisy labels [20] or when the graph is extremely dense in certain regions. The second term of C1 penalizes a lack of consistency with the geometry of the data, i.e., a graph regularizer. If wij is large, we prefer a solution in which pi and pj are close in the KLD sense. The last term encourages each pi to be close to the uniform distribution if not preferred to the contrary by the first two terms. This acts as a guard against degenerate solutions commonly encountered in graph-based SSL [6], e.g., in cases where a sub-graph is not connected to any labeled vertex. We conjecture that by maximizing the entropy of each pi , the classifier has a better chance of producing high entropy results in graph regions of low confidence (e.g. close to the decision boundary and/or low density regions). To recap, C1 makes use of the manifold assumption, is naturally multi-class and able to encode label uncertainty. y

As C1 is convex in p with linear constraints, we have a convex programming problem. However, a closed form solution does not exist and so standard numerical optimization approaches such as interior point methods (IPM) or method of multipliers (MOM) can be used to solve the problem. But, each of these approaches have their own shortcomings and are rather cumbersome to implement (e.g. an implementation of MOM to solve this problem would have 7 extraneous parameters). Thus, in [11], we proposed the use of AM for minimizing C1 . We will address the question of whether AM is superior to IPMs or MOMs for minimizing C1 shortly. Consider a problem of minimizing d(p, q) over p ∈ P, q ∈ Q. Sometimes solving this problem directly is hard and in such cases AM lends itself as a valuable tool for efficient optimization. It is an iterative process in which p(n) = argminp∈P d(p, q (n−1) ) and q (n+1) = argminq∈Q d(p(n) , q). The Expectation-Maximization (EM) [21] algorithm is an example of AM. C1 is not amenable to optimization using AM and so we have proposed a modified version of the objective where (p∗ , q∗ ) = minm C2 (p, q) and p,q∈M

C2 (p, q) =

l X i=1

m m X X X 0 H(pi ). DKL ri ||qi + µ wij DKL pi ||qj − ν i=1 j∈N 0 (i)

i=1 0

In the above, a third measure qi , ∀ i ∈ V is defined over the measurable space (Y, Y), W = 0 W + αIn , N (i) = {{i} ∪ N (i)} and α ≥ 0. Here the qi ’s play a similar role as the pi ’s and can potentially be used to obtain a final classification result (argmaxy qi (y)), but α, which is a hyper-parameter, plays an important role in ensuring that pi and qi are close ∀ i. It should be at least intuitively clear that as α gets large, the reformulated objective (C2 ) apparently approaches the original objective (C1 ). Our results from [11] suggest that setting α = 2 ensures that p∗ = q∗ (more on this in the next section). It is important to highlight that C2 (p, q) is itself still a valid SSL criterion. While the first term encourages qi for the labeled vertices to be close to the labels, ri , the last term encourages higher entropy pi ’s. The second term, in addition to acting as a graph regularizer, also acts as glue between the p’s and q’s. The update equations for solving C2 (p, q) are given by P 0 P 0 (n) (n−1) exp{ γµi j wij log qj (y)} ri (y)δ(i ≤ l) + µ j wji pj (y) (n) (n) P 0 pi (y) = P and q (y) = i µ P 0 log q (n−1) (y)} δ(i ≤ l) + µ j wji exp{ w j y j ij γi P 0 where γi = ν + µ j wij . Intuitively, discrete probability measures are being propagated between vertices along edges, so we refer to this algorithm as measure propagation (MP). When AM is used to solve an optimization problem, a closed form solution to each of the steps of the AM is desired but not always guaranteed [7]. It can be seen that solving C2 using AM has a single additional hyper-parameter while other approaches such as MOM can have as many as 7. Further, as we show in section 4, the AM update equations can be easily parallelized. We briefly comment on the relationship to previous work. As noted in section 1, a majority of the previous graph-based SSL algorithms are based on minimizing squared error [6, 5]. While 3

these objectives are convex and in some cases admit closed-form (i.e., non-iterative) solutions, they require inverting a matrix of size m × m. Thus in the case of very large data sets (e.g., like the one we consider in section 5), it might not be feasible to use this approach. Therefore, an iterative update is employed in practice. Also, squared-error is only optimal under a Gaussian loss model and thus more suitable for regression rather than classification problems. Squared-loss penalizes absolute error, while KLD, on the other-hand penalizes relative error (pages 226 and 235 of [10]). Henceforth, we refer to a multi-class extension of algorithm 11.2 in [20] as SQ-Loss. The Information Regularization (IR) [7] approach and subsequently the algorithm of Tsuda [8] use KLD based objectives and utilize AM to solve the problem. However these algorithms are motivated from a different perspective. In fact, as stated above, one of the steps of the AM procedure in the case of IR does not admit a closed form solution. In addition, neither IR nor the work of Tsuda use an entropy regularizer, which, as our results will show, leads to improved performance. While the two steps of the AM procedure in the case of Tsuda’s work have closed form solutions and the approach is applicable to hyper-graphs, one of the updates (equation 13 in [8]) is a special of the (n) update for pi . For more connections to previous approaches, see Section 4 in [11].

3

Optimal Convergence of AM on C2

We show that AM on C2 converges to the minimum of C2 , and that there exists a finite α such that the optimal solutions of C1 and C2 are identical. Therefore, C2 is a perfect tractable surrogate for C1 . In general, AM is not always guaranteed to converge to the correct solution. For example, consider minimizing f (x, y) = x2 + 3xy + y 2 over x, y ∈ R where f (x, y) is unbounded below (consider y = −x). But AM says that (x∗ , y ∗ ) = (0, 0) which is incorrect (see [22] for more examples). For AM to converge to the correct solution certain conditions must be satisfied. These might include topological properties of the optimization problem [23, 24] or certain geometrical properties [25]. The latter is referred to as the Information Geometry approach where the 5-points property (5pp) [25] plays an important role in determining convergence and is the method of choice here. Theorem 3.1 (Convergence of AM on C2 ). If (0)

p(n) = argmin C2 (p, q(n−1) ), q(n) = argmin C2 (p(n) , q) and qi (y) > 0 ∀ y ∈ Y, ∀i then q∈Mm

p∈Mm

(a) C2 (p, q) + C2 (p, p(0) ) ≥ C2 (p, q(1) ) + C2 (p(1) , q(1) ) for all p, q ∈Mm , and (b) lim C2 (p(n) , q(n) ) = inf p,q∈Mm C2 (p, q). n→∞

Proof Sketch: (a) is the 5-pp for C2 (p, q). 5-pp holds if the 3-points (3-pp) and 4-points (4-pp) properties hold. In order to show 3-pp, let f (t) , C2 (p(t) , q(0) ) where p(t) = (1 − t)p + tp(1) , 0 < t ≤ 1. Next we use the fact that the first-order Taylor’s approximation underestimates a convex function to upper bound the gradient of f (t) w.r.t t. We then pass this to the limit as t → 1 and use the monotone convergence theorem to exchange the limit and the summation. This gives the 3-pp. The proof for 4-pp follows in a similar manner. (b) follows as a result of Theorem 3 in [25]. Theorem 3.2 (Test for Convergence). If {(p(n) , q(n) )}∞ n=1 is generated by AM of C2 (p, q) and C2 (p∗ , q∗ ) , inf p,q∈Mm C2 (p, q) then C2 (p(n) , q(n) ) − C2 (p∗ , q∗ ) ≤

m X i=1

(n) X qi (y) 0 δ(i ≤ l) + di βi where βi , log sup (n−1) , dj = wij . y q (y) i i

Proof Sketch: As the 5-pp holds for all p, q ∈Mm , it also holds for p = p∗ and q = q∗ . We use fact that E(f (Z)) ≤ supz f (z) where Z is a random variable and f (·) is an arbitrary function. The above means that AM on C2 converges to its optimal value. We also have the following theorems that show the existence of a finite lower-bound on α such that the optimum of C1 and C2 are the same. 0 Lemma 3.3. If C2 (p, q; wii = 0) is C2 when the diagonal elements of the affinity matrix are all zero then we have that 0 min C2 (p, q; wii = 0) ≤ minm C1 (p)

p,q∈Mm

p∈M

4

Theorem 3.4. Given any A, B, S ∈Mm (i.e., A = [a1 , . . . , an ] , B = [b1 , . . . , bn ] , S = [s1 , . . . , sn ]) such that ai (y), bi (y), si (y) > 0, ∀ i, y and A 6= B (i.e., not all ai (y) = bi (y)) then there exists a finite α such that C2 (A, B) ≥ C2 (S, S) = C1 (S) Theorem 3.5 (Equality of Solutions of C1 and C2 ). Let p ˆ = argmin C1 (p) and (p∗α˜ , q∗α˜ ) = p∈Mm

argmin C2 (p, q; α ˜ ) for an arbitrary α = α ˜ > 0 where p∗α˜ = (p∗1;α˜ , · · · , p∗m;α˜ ) and q∗α˜ = p,q∈Mm

∗ ∗ (q1; ˆ such that at convergence of AM, we have that α ˜ , · · · , qm;α ˜ ). Then there exists a finite α p ˆ = p∗αˆ = q∗αˆ . Further, it is the case that if p∗α˜ 6= q∗α˜ , then

α ˆ≥

C1 (ˆ p) − C2 (p∗ , q∗ ; α = 0) Pn . µ i=1 DKL (p∗i;α˜ ||qi;∗ α˜ )

And if p∗α˜ = q∗α˜ then α ˆ≥α ˜.

4

Parallelism and Scalability to Large Datasets

One big advantage of AM on C2 over optimizing C1 directly is that it is naturally amenable to a parallel implementation, and is also amenable to further optimizations (see below) that yield a near linear speedup. Consider the update equations of Section 2. We see that one set of measures is held fixed while the other set is updated without any required communication amongst set members, so there is no write contention. This immediately yields a T ≥ 1-threaded implementation where the graph is evenly T -partitioned and each thread operates over only a size m/T = (l + u)/T subset of the graph nodes. We constructed a 10-NN graph using the standard TIMIT training and development sets (see section 5). The graph had 1.4 million vertices. We ran a timing test on a 16 core symmetric multiprocessor with 128GB of RAM, each core operating at 1.6GHz. We varied the number T of threads from 1 (single-threaded) up to 16, in each case running 3 iterations of AM (i.e., 3 each of p and q updates). Each experiment was repeated 10 times, and we measured the minimum CPU time over these 10 runs (total CPU time only was taken into account). The speedup for T threads is typically defined as the ratio of time taken for single thread to time taken for T threads. The solid (black) line in figure 1(a) represents the ideal case (a linear speedup), i.e., when using T threads results in a speedup of T . The pointed (green) line shows the actual speedup of the above procedure, typically less than ideal due to inter-process communication and poor shared L1 and/or L2 microprocessor cache interaction. When T ≤ 4, the speedup (green) is close to ideal, but for increasing T the performance diminishes away from the ideal case. Our contention is that the sub-linear speedup is due to the poor cache cognizance of the algorithm. At a given point in time, suppose thread t ∈ {1, . . . , T } is operating on node it . The collective set of neighbors that are being used by these T threads are {∪Tt=1 N (it )} and this, along with nodes ∪Tt=1 {it } (and all memory for the associated measures), constitute the current working set. The working set should be made as small as possible to increase the chance it will fit in the microprocessor caches, but this becomes decreasingly likely as T increases since the working set is monotonically increasing with T . Our goal, therefore, is for the nodes that are being simultaneously operated on to have a large amount of neighbor overlap thus minimizing the working set size. Viewed as an optimization problem, we must find a partition (V1 , V2 , . . . , Vm/T ) of V that minimizes maxj∈{1,...,m/T } | ∪v∈Vj N (v)|. With such a partition, we may also order the subsets so that the neighbors of Vi would have maximal overlap with the neighbors of Vi+1 . We then schedule the T nodes in Vj to run simultaneously, and schedule the Vj sets successively. Of course, the time to produce such a partition cannot dominate the time to run the algorithm itself. Therefore, we propose a simple fast node ordering procedure (Algorithm 1) that can be run once before the parallelization begins. The algorithm orders the nodes such that successive nodes are likely to have a high amount of neighbor overlap with each other and, by transitivity, with nearby nodes in the ordering. It does this by, given a node v, choosing another node v 0 from amongst v’s neighbors’ neighbors (meaning the neighbors of v’s neighbors) that has the highest neighbor overlap. We need not search all V nodes for this, since anything other than v’s neighbors’ neighbors 5

Algorithm 1 Graph Ordering Algorithm Select an arbitrary node v. while there are any unselected nodes remaining do Let N (v) be the set of neighbors, and N 2 (v) be the set of neighbors’ neighbors, of v. Select a currently unselected v 0 ∈ N 2 (v) such that |N (v) ∩ N (v 0 )| is maximized. If the intersection is empty, select an arbitrary unselected v 0 . v ← v0 . end while 16

6.5

Linear Speed−Up Re−Ordered Graph Original Graph

14

After Re−Ordering Before Re−Ordering

6

log(CPU Time)

speed−up

12 10 8 6 4

5.5 5 4.5 4

2 2

4

6 8 10 Number of Threads

12

14

3.5

16

2

4

6 8 10 Number of Threads

12

14

16

Figure 1: (a) speedup vs. number of threads for the TIMIT graph (see section 5). The process was run on a 128GB, 16 core machine with each core at 1.6GHz. (b) The actual CPU times in seconds on a log scale vs. number of threads for with and without ordering cases. has no overlap with the neighbors of v. Given such an ordering, the tth thread operates on nodes {t, t + m/T, t + 2m/T, . . . }. If the threads proceed synchronously (which we do not enforce) the set of nodes being processed at any time instant are {1 + jm/T, 2 + jm/T, . . . , T + jm/T }. This assignment is beneficial not only for maximizing the set of neighbors being simultaneously used, but also for successive chunks of T nodes since once a chunk of T nodes have been processed, it is likely that many of the neighbors of the next chunk of T nodes will already have been pre-fetched into the caches. With the graph represented as an adjacency list, and sets of neighbor indices sorted, our algorithm is O(mk 3 ) in time and linear in memory since the intersection between two sorted lists may be computed in O(k) time. This is sometimes better than O(m log m) for cases where k 3 < log m, true for very large m. We ordered the TIMIT graph nodes, and ran timing tests as explained above. To be fair, the time required for node ordering is charged against every run. The results are shown in figure 1(a) (pointed red line) where the results are much closer to ideal, and there are no obvious diminishing returns like in the unordered case. Running times are given in figure 1(b). Moreover, the ordered case showed better performance even for a single thread T = 1 (CPU time of 539s vs. 565s for ordered vs. unordered respectively, on 3 iterations of AM). We conclude this section by noting that (a) re-ordering may be considered a pre-processing (offline) step, (b) the SQ-Loss algorithm may also be implemented in a multi-threaded manner and this is supported by our implementation, (c) our re-ordering algorithm is general and fast and can be used for any graph-based algorithm where the iterative updates for a given node are a function of its neighbors (i.e., the updates are harmonic w.r.t. the graph [5]), and (d) while the focus here was on parallelization across different processors on a symmetric multiprocessor, this would also apply for distributed processing across a network with a shared network disk.

5

Results

In this section we present results on two popular phone classification tasks. We use SQ-Loss as the competing graph-based algorithm and compare its performance against that of MP because (a) SQ-Loss has been shown to outperform its other variants, such as, label propagation [4] and the harmonic function algorithm [5], (b) SQ-Loss scales easily to very large data sets unlike approaches like spectral graph transduction [6], and (c) SQ-Loss gives similar performance as other algorithms that minimize squared error such as manifold regularization [20]. 6

64

46

62 44

Phone Recognition Accuracy

60

Phone Accuracy

58 MP

56

MP (ν = 0)

54

MLP SQ−Loss

52 50

42

40

38

36

48 46 0

5

10 15 20 25 Percentage of TIMIT Training Set Used

34

30

MP SQ−Loss 0

20

40 60 80 Percentage of SWB Training Data

100

Figure 2: Phone accuracy on the TIMIT test set (a,left) and phone accuracy vs. amount of SWB training data (b,right). With all SWB data added, the graph has 120 million nodes. TIMIT Phone Classification: TIMIT is a corpus of read speech that includes time-aligned phonetic transcriptions. As a result, it has been popular in the speech community for evaluating supervised phone classification algorithms [26]. Here, we use it to evaluate SSL algorithms by using fractions of the standard TIMIT training set, i.e., simulating the case when only small amounts of data are labeled. We constructed a symmetrized 10-NN graph (G timit ) over the TIMIT training and development sets (minimum graph degree is 10). The graph had about 1.4 million vertices. We used sim(xi , xj ) = exp{−(xi − xj )T Σ−1 (xi − xj )} where Σ is the covariance matrix computed over the entire training set. In order to obtain the features, xi , we first extracted mel-frequency cepstral coefficients (MFCC) along with deltas in the manner described in [27]. As phone classification performance is improved with context information, each xi was constructed using a 7 frame context window. We follow the standard practice of building models to classify 48 phones (|Y| = 48) and then mapping down to 39 phones for scoring [26]. We compare the performance of MP against MP with no entropy regularization (ν = 0), SQ-Loss, and a supervised state-of-the-art L2 regularized multi-layered perceptron (MLP) [10]. The hyperparameters in each case, i.e., number of hidden units and regularization weight in case of MLP, µ and ν in the case of MP and SQ-Loss, were tuned on the development set. For the MP and SQLoss, the hyper-parameters were tuned over the following sets µ ∈ {1e–8, 1e–4, 0.01, 0.1} and ν ∈ {1e–8, 1e–6, 1e–4, 0.01, 0.1}. We found that setting α = 1 in the case of MP ensured that p = q at convergence. As both MP and SQ-Loss are transductive, in order to measure performance on an independent test set, we induce the labels using the Nadaraya-Watson estimator (see section 6.4 in [2]) with 50 NNs using the similarity measure defined above. Figure 2(a) shows the phone classification results on the NIST Core test set (independent of the development set). We varied the number of labeled examples by sampling a fraction f of the TIMIT training set. We show results for f ∈ {0.005, 0.05, 0.1, 0.25, 0.3}. In all cases, for MP and SQLoss, we use the same graph G timit , but the set of labeled vertices changes based on f . In all cases the MLP was trained fully-supervised. We only show results on the test set, but the results on the development set showed similar trends. It can be seen that (i) using an entropy regularizer leads to much improved results in MP, (ii) as expected, the MLP being fully-supervised, performs poorly compared to the semi-supervised approaches, and most importantly, (iii) MP significantly outperforms all other approaches. We believe that MP outperforms SQ-Loss as the loss function in the case of MP is better suited for classification. We also found that for larger values of f (e.g., at f = 1), the performances of MLP and MP did not differ significantly. But those are more representative of the supervised training scenarios which is not the focus here. Switchboard-I Phone Classification: Switchboard-I (SWB) is a collection of about 2,400 two-sided telephone conversations among 543 speakers [28]. SWB is often used for the training of large vocabulary speech recognizers. The corpus is annotated at the word-level. In addition, less reliable phone level annotations generated in an automatic manner by a speech recognizer with a non-zero error rate are also available [29]. The Switchboard Transcription Project (STP) [30] was undertaken to accurately annotate SWB at the phonetic and syllable levels. As a result of the arduous and costly nature of this transcription task, only 75 minutes (out of 320 hours) of speech segments selected from different SWB conversations were annotated at the phone level and about 150 minutes annotated at the syllable level. Having such annotations for all of SWB could be useful for speech processing in general, so this is an ideal real-world task for SSL. 7

We make use of only the phonetic labels ignoring the syllable annotations. Our goal is to phonetically annotate SWB in STP style while treating STP as labeled data, and in the process show that our aforementioned parallelism efforts scale to extremely large datasets. We extracted features xi from the conversations by first windowing them using a Hamming window of size 25ms at 100Hz. We then extracted 13 perceptual linear prediction (PLP) coefficients from these windowed features and appended both deltas and double-deltas resulting in a 39 dimensional feature vector. As with TIMIT, we are interested in phone classification and we use a 7 frame context window to generate xi , stepping successive context windows by 10ms as is standard in speech recognition. We randomly split the 75 minute phonetically annotated part of STP into three sets, one each for training, development and testing containing 70%, 10% and 20% of the data respectively (the size of the development set is considerably smaller than the size of the training set). This procedure was repeated 10 times (i.e. we generated 10 different training, development and test sets by random sampling). In each case, we trained a phone classifier using the training set, tuned the hyper-parameters on the development set and evaluated the performance on the test set. In the following, we refer to SWB that is not a part of STP as SWB-STP. We added the unlabeled SWB-STP data in stages. The percentage, s, included, 0%, 2%, 5%, 10%, 25%, 40%, 60%, and 100% of SWB-STP. We ran both MP and SQ-Loss in each case. When s =100%, there were about 120 million nodes in the graph! Due to the large size m = 120M of the dataset, it was not possible to generate the graph using the conventional brute-force search which is O(m2 ). Nearest neighbor search is a well-researched problem with many approximate solutions [31]. Here we make use of the Approximate Nearest Neighbor (ANN) library (see http://www.cs.umd.edu/˜mount/ANN/) [32]. It constructs a modified version of a kd-tree which is then used to query the NNs. The query process requires that one specify an error term, , and guarantees that (d(xi , N (xi ))/d(xi , N (xi ))) ≤ 1 + . where N (xi ) is a function that returns the actual NN of xi while N (xi ) returns the approximate NN. We constructed graphs using the STP data and s% of (unlabeled) SWB-STP data. For all the experiments here we used a symmetrized 10-NN graph and = 2.0. The labeled and unlabeled points in the graph changed based on training, development and test sets used. In each case, we ran both the MP and SQ-Loss objectives. For each set, we ran a search over µ ∈ {1e–8, 1e–4, 0.01, 0.1} and ν ∈ {1e–8, 1e–6, 1e–4, 0.01, 0.1} for both the approaches. The best value of the hyper-parameters were chosen based on the performance on the development set and the same value was used to measure the accuracy on the test set. The mean phone accuracy over the different test sets (and the standard deviations) are shown in figure 2(b) for the different values of s. It can be seen that MP outperforms SQ-Loss in all cases. Equally importantly, we see that the performance on the STP data improves with the addition of increasing amounts of unlabeled data.

References [1] O. Chapelle, B. Scholkopf, and A. Zien, Semi-Supervised Learning. MIT Press, 2007. [2] X. Zhu, “Semi-supervised learning literature survey,” tech. rep., Computer Sciences, University of Wisconsin-Madison, 2005. [3] M. Szummer and T. Jaakkola, “Partially labeled classification with Markov random walks,” in Advances in Neural Information Processing Systems, vol. 14, 2001. [4] X. Zhu and Z. Ghahramani, “Learning from labeled and unlabeled data with label propagation,” tech. rep., Carnegie Mellon University, 2002. [5] X. Zhu, Z. Ghahramani, and J. Lafferty, “Semi-supervised learning using gaussian fields and harmonic functions,” in Proc. of the International Conference on Machine Learning (ICML), 2003. [6] T. Joachims, “Transductive learning via spectral graph partitioning,” in Proc. of the International Conference on Machine Learning (ICML), 2003. [7] A. Corduneanu and T. Jaakkola, “On information regularization,” in Uncertainty in Artificial Intelligence, 2003. [8] K. Tsuda, “Propagating distributions on a hypergraph by dual information regularization,” in Proceedings of the 22nd International Conference on Machine Learning, 2005. [9] M. Belkin, P. Niyogi, and V. Sindhwani, “On manifold regularization,” in Proc. of the Conference on Artificial Intelligence and Statistics (AISTATS), 2005. [10] C. Bishop, ed., Neural Networks for Pattern Recognition. Oxford University Press, 1995.

8

[11] A. Subramanya and J. Bilmes, “Soft-supervised text classification,” in EMNLP, 2008. [12] R. Collobert, F. Sinz, J. Weston, L. Bottou, and T. Joachims, “Large scale transductive svms,” Journal of Machine Learning Research, 2006. [13] V. Sindhwani and S. S. Keerthi, “Large scale semi-supervised linear svms,” in SIGIR ’06: Proceedings of the 29th annual international ACM SIGIR, 2006. [14] O. Delalleau, Y. Bengio, and N. L. Roux, “Efficient non-parametric function induction in semi-supervised learning,” in Proc. of the Conference on Artificial Intelligence and Statistics (AISTATS), 2005. [15] M. Karlen, J. Weston, A. Erkan, and R. Collobert, “Large scale manifold transduction,” in International Conference on Machine Learning, ICML, 2008. [16] I. W. Tsang and J. T. Kwok, “Large-scale sparsified manifold regularization,” in Advances in Neural Information Processing Systems (NIPS) 19, 2006. [17] A. Tomkins, “Keynote speech.” CIKM Workshop on Search and Social Media, 2008. [18] A. Jansen and P. Niyogi, “Semi-supervised learning of speech sounds,” in Interspeech, 2007. [19] T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley Series in Telecommunications, New York: Wiley, 1991. [20] Y. Bengio, O. Delalleau, and N. L. Roux, Semi-Supervised Learning, ch. Label Propogation and Quadratic Criterion. MIT Press, 2007. [21] Dempster, Laird, and Rubin, “Maximum likelihood from incomplete data via the em algorithm,” Journal of the Royal Statistical Society, Series B, vol. 39, no. 1, pp. 1–38, 1977. [22] T. Abatzoglou and B. O. Donnell, “Minimization by coordinate descent,” Journal of Optimization Theory and Applications, 1982. [23] W. Zangwill, Nonlinear Programming: a Unified Approach. Englewood Cliffs: N.J.: Prentice-Hall International Series in Management, 1969. [24] C. F. J. Wu, “On the convergence properties of the EM algorithm,” The Annals of Statistics, vol. 11, no. 1, pp. 95–103, 1983. [25] I. Csiszar and G. Tusnady, “Information Geometry and Alternating Minimization Procedures,” Statistics and Decisions, 1984. [26] A. K. Halberstadt and J. R. Glass, “Heterogeneous acoustic measurements for phonetic classification,” in Proc. Eurospeech ’97, (Rhodes, Greece), pp. 401–404, 1997. [27] K. F. Lee and H. Hon, “Speaker independant phone recognition using hidden markov models,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 37, no. 11, 1989. [28] J. Godfrey, E. Holliman, and J. McDaniel, “Switchboard: Telephone speech corpus for research and development,” in Proceedings of ICASSP, vol. 1, (San Francisco, California), pp. 517–520, March 1992. [29] N. Deshmukh, A. Ganapathiraju, A. Gleeson, J. Hamaker, and J. Picone, “Resegmentation of switchboard,” in Proceedings of ICSLP, (Sydney, Australia), pp. 1543–1546, November 1998. [30] S. Greenberg, “The Switchboard transcription project,” tech. rep., The Johns Hopkins University (CLSP) Summer Research Workshop, 1995. [31] J. Friedman, J. Bentley, and R. Finkel, “An algorithm for finding best matches in logarithmic expected time,” ACM Transaction on Mathematical Software, vol. 3, 1977. [32] S. Arya and D. M. Mount, “Approximate nearest neighbor queries in fixed dimensions,” in ACM-SIAM Symp. on Discrete Algorithms (SODA), 1993.

9